/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 144 struct wpa_ptk *ptk, int akmp, int cipher) in wpa_pmk_to_ptk() argument 168 ptk->kck_len = wpa_kck_len(akmp); in wpa_pmk_to_ptk() 169 ptk->kek_len = wpa_kek_len(akmp); in wpa_pmk_to_ptk() 170 ptk->tk_len = wpa_cipher_key_len(cipher); in wpa_pmk_to_ptk() 171 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len; in wpa_pmk_to_ptk() 194 os_memcpy(ptk->kck, tmp, ptk->kck_len); in wpa_pmk_to_ptk() 195 wpa_hexdump_key(MSG_DEBUG, "WPA: KCK", ptk->kck, ptk->kck_len); in wpa_pmk_to_ptk() 197 os_memcpy(ptk->kek, tmp + ptk->kck_len, ptk->kek_len); in wpa_pmk_to_ptk() 198 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK", ptk->kek, ptk->kek_len); in wpa_pmk_to_ptk() 200 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); in wpa_pmk_to_ptk() [all …]
|
D | wpa_common.h | 342 struct wpa_ptk *ptk, int akmp, int cipher); 363 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa.c | 158 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, in wpa_sm_key_request() 340 struct wpa_ptk *ptk) in wpa_supplicant_send_2_of_4() argument 424 return wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst, in wpa_supplicant_send_2_of_4() 430 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) in wpa_derive_ptk() argument 434 return wpa_derive_ptk_ft(sm, src_addr, key, ptk); in wpa_derive_ptk() 439 key->key_nonce, ptk, sm->key_mgmt, in wpa_derive_ptk() 451 struct wpa_ptk *ptk; in wpa_supplicant_process_1_of_4() local 502 ptk = &sm->tptk; in wpa_supplicant_process_1_of_4() 503 wpa_derive_ptk(sm, src_addr, key, ptk); in wpa_supplicant_process_1_of_4() 507 os_memcpy(buf, &ptk->tk[16], 8); in wpa_supplicant_process_1_of_4() [all …]
|
D | wpa_i.h | 24 struct wpa_ptk ptk, tptk; member 264 sm->ctx->set_rekey_offload(sm->ctx->ctx, sm->ptk.kek, sm->ptk.kek_len, in wpa_sm_set_rekey_offload() 265 sm->ptk.kck, sm->ptk.kck_len, in wpa_sm_set_rekey_offload() 363 struct wpa_ptk *ptk); 367 struct wpa_ptk *ptk); 370 const struct wpa_eapol_key *key, struct wpa_ptk *ptk);
|
D | wpa_ft.c | 22 const struct wpa_eapol_key *key, struct wpa_ptk *ptk) in wpa_derive_ptk_ft() argument 46 sm->bssid, sm->pmk_r1_name, ptk, ptk_name, in wpa_derive_ptk_ft() 331 sizeof(null_rsc), (u8 *) sm->ptk.tk, keylen) < 0) { in wpa_ft_install_ptk() 477 sm->own_addr, bssid, sm->pmk_r1_name, &sm->ptk, in wpa_ft_process_response() 483 sm->ptk.kck, sm->ptk.kck_len, bssid, in wpa_ft_process_response() 562 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11, in wpa_ft_process_gtk_subelem() 642 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, WPA_IGTK_LEN / 8, in wpa_ft_process_igtk_subelem() 767 if (wpa_ft_mic(sm->ptk.kck, sm->ptk.kck_len, sm->own_addr, src_addr, 6, in wpa_ft_validate_reassoc_resp()
|
D | peerkey.c | 117 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, dst, in wpa_supplicant_send_smk_error() 171 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, src_addr, in wpa_supplicant_send_smk_m3() 1087 wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid, in wpa_sm_stkstart()
|
/external/google-breakpad/src/tools/solaris/dump_syms/testdata/ |
D | dump_syms_regtest.stabs | 10 …5: .stabs "V=9.0;DBG_GEN=5.0.8;dm;cd;backend;ptf;ptx;ptk;s;g;R=5.8<<Sun C++ 5.8 Patch 121018-07 2… 118 …5: .stabs "V=9.0;DBG_GEN=5.0.8;dm;cd;backend;ptf;ptx;ptk;s;g;R=5.8<<Sun C++ 5.8 Patch 121018-07 2…
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_i.h | 255 struct wpa_ptk *ptk);
|
D | wpa_auth.c | 48 struct wpa_ptk *ptk); 2032 struct wpa_ptk *ptk) in wpa_derive_ptk() argument 2036 return wpa_auth_derive_ptk_ft(sm, pmk, ptk); in wpa_derive_ptk() 2041 ptk, sm->wpa_key_mgmt, sm->pairwise); in wpa_derive_ptk()
|
D | wpa_auth_ft.c | 365 struct wpa_ptk *ptk) in wpa_auth_derive_ptk_ft() argument 400 ptk, ptk_name, sm->wpa_key_mgmt, sm->pairwise); in wpa_auth_derive_ptk_ft()
|
/external/chromium-trace/catapult/tracing/test_data/ |
D | ddms_calculator_start.trace | 15006 ���ptk�Y� 38969 ���ptk��� 294279 XL�ptk��
|